2010 IEEE Global Telecommunications Conference GLOBECOM 2010最新文献

筛选
英文 中文
Impact of Mobility on VANETs' Safety Applications 移动性对VANETs安全应用的影响
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684042
K. A. Hafeez, Lian Zhao, Z. Liao, B. Ma
{"title":"Impact of Mobility on VANETs' Safety Applications","authors":"K. A. Hafeez, Lian Zhao, Z. Liao, B. Ma","doi":"10.1109/GLOCOM.2010.5684042","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684042","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) differ from the predominant models of Mobile Ad hoc Networks (MANET) due to their high speed, mobility constraints and drivers' behaviour. Most researches on analyzing the performance of VANETs' applications done without taking into account the vehicles' high dynamics assuming stationary distribution of vehicles on the road. They assume that all vehicles within the range of the transmitter will receive the transmitted packets successfully. While vehicles near the outer edge of the transmitter's range are more vulnerable to cross the boundary before they receive the packet completely. They also used Most Forward Within Range (MFR) [1] to forward the message from one hop to the next. In this paper, we develop a new mobility model to derive the number of vehicles on the road and the probability of receiving the broadcasted packets successfully from all vehicles within the range of the transmitter. We also derive the probability of multi hop connectivity taking into account the location of relay vehicles and prove that MFR is not a valid scheme in VANETs.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72755112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Performance Comparison of Energy-Efficient Power Control for CDMA Code Acquisition and Detection CDMA码采集与检测中节能功率控制的性能比较
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684239
G. Bacci, M. Luise
{"title":"Performance Comparison of Energy-Efficient Power Control for CDMA Code Acquisition and Detection","authors":"G. Bacci, M. Luise","doi":"10.1109/GLOCOM.2010.5684239","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684239","url":null,"abstract":"This paper investigates the performance of distributed power control techniques in the uplink of a flat-fading CDMA wireless network, based on noncooperative game theory. Two energy-efficient criteria, tailored for data detection and code synchronization, are compared in terms of achieved utility at the Nash equilibrium, showing that the optimal power allocation devised for data detection is not the best solution during synchronization, and analogously the optimal allocation for code acquisition does not provide the best performance during data detection. Closed-form expressions for the optimal powers at the Nash equilibrium are derived, and a unified formulation is proposed to allow a more elaborated power allocation method to be adopted, in which the terminals, using the synchronization-oriented approach, can revert to the data-detection optimal criterion after synchronization is over.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Outage Performance of DF Network Coded (DFNC) Multi-User Cooperative Diversity in Orthogonal Uplink Channels 正交上行信道中DF网络编码(DFNC)多用户合作分集的中断性能
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683704
Bin Guo, K. Vardhe, Yu Liu, Chi Zhou, Yu Cheng
{"title":"Outage Performance of DF Network Coded (DFNC) Multi-User Cooperative Diversity in Orthogonal Uplink Channels","authors":"Bin Guo, K. Vardhe, Yu Liu, Chi Zhou, Yu Cheng","doi":"10.1109/GLOCOM.2010.5683704","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683704","url":null,"abstract":"In this paper, we propose a Decode-and-Forward Network Coded (DFNC) multi-user cooperation scheme for orthogonal uplink channels in a wireless network. The network consists of m peers having independent information transmitting to a common destination. Each peer transmits its own data in the first time phase and serves as a relay in the second time phase to transmit the network coded information combining its own and others. Assuming block fading with independent fading coefficients, we evaluate the outage probability performance of the proposed scheme using high-SNR approximation. Particularly, we develop an upper bound on outage probability of DFNC, and compare it with Space-Time-Coded (STC) cooperation protocol and Repetition-based (REP) cooperation protocol. From theoretical analysis and numerical results, we show that the outage performance of proposed scheme outperforms both STC and REP at least in high-SNR region, regardless of total number of cooperating peers and provides diversity order of m + 1 in contrast with diversity order of m provided by STC and REP.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"64 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73350642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
MIMO Cross-Layer Secure Communication Architecture Based on STBC 基于STBC的MIMO跨层安全通信体系结构
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684012
H. Wen, G. Gong, P. Ho
{"title":"MIMO Cross-Layer Secure Communication Architecture Based on STBC","authors":"H. Wen, G. Gong, P. Ho","doi":"10.1109/GLOCOM.2010.5684012","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684012","url":null,"abstract":"The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of wireless networks. In this work, we present a cross-layer security scheme for STBC system. By introducing a distort signal set the sender randomly flip-flops between the distort signal set and the orthogonal code set to confuse the attacker. The physicallayer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73676196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Physical Layer Error Correction Based Cipher 基于物理层纠错的密码
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683788
O. Adamo, Shengli Fu, M. Varanasi
{"title":"Physical Layer Error Correction Based Cipher","authors":"O. Adamo, Shengli Fu, M. Varanasi","doi":"10.1109/GLOCOM.2010.5683788","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683788","url":null,"abstract":"In conventional communication systems, error correction is carried out at the physical layer while data security is performed performed at an upper layer. As a result, these steps are done as separate steps. As opposed to this conventional system, we present a scheme that combines error correction and data security as one unit so that both encryption and encoding could be carried out at the physical layer. Hence, in this paper, we present an Error Correction Based Cipher (ECBC) that combines error correction and encryption/decryption in a single step. Encrypting and encoding or decoding and decrypting in a single step will lead to a faster and more efficient implementation. One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. However in ECBC, there is no trade off between reliability and security. Errors introduced at the transmitter for randomization are removed at the receiver. Hence ECBC can utilize its full capacity to correct channel errors. We show the result of randomization test on ECBC and its security against conventional attacks. We also present the result of the FPGA implementation of the ECBC encryption.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"10 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72718457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On Parallel UDP-Based Transport Control over Dedicated Connections 基于并行udp的专用连接传输控制研究
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683484
Xukang Lu, C. Wu, N. Rao, Zongmin Wang
{"title":"On Parallel UDP-Based Transport Control over Dedicated Connections","authors":"Xukang Lu, C. Wu, N. Rao, Zongmin Wang","doi":"10.1109/GLOCOM.2010.5683484","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683484","url":null,"abstract":"Several research and production high-performance networks now provision multi-Gbps dedicated channels to support large data transfers in network-intensive applications. However, end users have not seen a corresponding increase in application throughput mainly because traditional end-to-end transport methods are not optimized for such connections. New congestion or flow control mechanisms are desirable to meet the challenges brought by dedicated connections to transport protocol design. The advent and proliferation of multi-core processors make it now possible to improve application throughput by providing multiple processing and networking resources to a single data transfer. Based on the existing PLUT method, we propose a new transport method, Para-PLUT, which utilizes multiple parallel UDP connections to take advantage of the full power of multicore processors for maximum aggregate goodput. We implement and test Para-PLUT in a local dedicated network testbed and the experimental results illustrate its superior performance over several existing methods.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"39 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74554394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Evaluation of Iterative Channel Codes for Digital Data Storage on Microfilm 微胶片上数字数据存储的迭代信道码性能评价
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683965
Florian Pflug, C. Voges, T. Fingscheidt
{"title":"Performance Evaluation of Iterative Channel Codes for Digital Data Storage on Microfilm","authors":"Florian Pflug, C. Voges, T. Fingscheidt","doi":"10.1109/GLOCOM.2010.5683965","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683965","url":null,"abstract":"In the past few years microfilm has gained new research interest as a medium for long-term storage of digital data. This became particularly possible by recent advances in laser film recording technology. In contrast to other optical or magnetic storage media, the microfilm digital channel (MDC) still has been subject to characterization in only a few publications. In this paper we investigate iterative channel codes for the MDC, in particular low-density parity-check and turbo convolutional codes. Simulation results show that practically error-free storage can be achieved with code rates even above 0.85 on a monochrome MDC with binary amplitude-shift keying modulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78745061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Information-Theoretic Approach to Resource Consumption Minimization for Dynamic Spectrum Access Networks 动态频谱接入网资源消耗最小化的信息论方法
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683153
M. Pursley, IV ThomasC.Royster
{"title":"An Information-Theoretic Approach to Resource Consumption Minimization for Dynamic Spectrum Access Networks","authors":"M. Pursley, IV ThomasC.Royster","doi":"10.1109/GLOCOM.2010.5683153","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683153","url":null,"abstract":"Information-theoretic limits on resource consumption are employed to obtain analytical methods for conducting tradeoffs between power, bandwidth, and time for cognitive radio transmissions in ad hoc dynamic spectrum access networks. A quantitative measure of resource consumption is applied to the design and evaluation of protocols for adaptive modulation and coding. The application of information theory to the minimization of resource consumption in cognitive radio networks is illustrated for binary phase-shift-key modulation with coherent demodulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72638452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Throughput-Delay Scaling for Two Mobile Overlaid Networks 两个移动覆盖网络的吞吐量-延迟缩放
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683829
W. Zhang, C. Yeo
{"title":"Throughput-Delay Scaling for Two Mobile Overlaid Networks","authors":"W. Zhang, C. Yeo","doi":"10.1109/GLOCOM.2010.5683829","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683829","url":null,"abstract":"In this paper, we study the throughput and delay scaling laws of two coexisting mobile networks. By considering that both the primary and secondary networks are mobile and move according to random walk model, we propose a multi-hop transmission scheme. Based on the assumption that the secondary node can help to relay the primary packet, we show that the secondary network can achieve the same throughput and delay scaling laws as in stand-alone network D_s(m)=Θ(mλ_s(m)). Furthermore, for primary network, it is shown that the throughput-delay tradeoff scaling law is given by D_p(n)=Θ(√{nlog{n}}λ_p(n)), when the primary node is chosen as relay node. If the relay node is a secondary node, the scaling law is D_p(n)=Θ(√{n^{β}log{n}}λ_p(n)), where β>1. The novelties of this paper lie in: i) Detailed study of the delay scaling law of the secondary network in the complex scenario where both the primary and secondary networks are mobile; ii) The impact of buffer delay on the primary and secondary networks due to the presence of preservation region. We explicitly analyze the buffer delay and obtain an expression as D^{II}_{S_R}(m)=Θ(1/√{n^{β-1}a_s(m)}).","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"101 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77393711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Iterative Polite Water-Filling for Weighted Sum-Rate Maximization in iTree Networks iTree网络中加权和速率最大化的迭代礼貌充水
2010 IEEE Global Telecommunications Conference GLOBECOM 2010 Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684051
An Liu, Y. Liu, Haige Xiang, Wu Luo
{"title":"Iterative Polite Water-Filling for Weighted Sum-Rate Maximization in iTree Networks","authors":"An Liu, Y. Liu, Haige Xiang, Wu Luo","doi":"10.1109/GLOCOM.2010.5684051","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684051","url":null,"abstract":"It is well known that in general, the traditional water-filling is far from optimal in networks. We recently found the long-sought network version of water-filling named polite water-filling that is optimal for a large class of MIMO networks called B-MAC networks, of which interference Tree (iTree) networks is a subset whose interference graphs have no directional loop. iTree networks is a natural extension of both broadcast channel (BC) and multiaccess channel (MAC) and possesses many desirable properties for further information theoretic study. Given the optimality of the polite water-filling, general purpose optimization algorithms for networks are no longer needed because they do not exploit the structure of the problems. Here, we demonstrate it through the weighted sum-rate maximization. The significance of the results is that the algorithm can be easily modified for general B-MAC networks with interference loops. It illustrates the properties of iTree networks and for the special cases of MAC and BC, replaces the current steepest ascent algorithms for finding the capacity regions. The fast convergence and high accuracy of the proposed algorithms are verified by simulation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"35 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77579426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信